[Openswan Users] no preshared key found error
matt.bazan at comcast.net
matt.bazan at comcast.net
Thu Oct 7 12:26:23 EDT 2010
thanks just figured it out .. connection entry was wrong. should look like:
conn SF-To-Trenton
authby=secret
left=69.xx.xx.xx
leftsubnet=192.168.0.0/24
leftnexthop=%defaultroute
right=173.xx.xx.xx
rightsubnet=192.168.10.0/24
rightnexthop=%defaultroute
auto=start
-m
----- "Randy Wyatt" <rwyatt at nvtl.com> wrote:
> For the ipsec.secrets file, try
>
> @sf.xx.com @trenton.xx.com : PSK "mypassword"
>
> Regards,
> Randy
>
> -----Original Message-----
> From: users-bounces at openswan.org [mailto:users-bounces at openswan.org]
> On
> Behalf Of matt.bazan at comcast.net
> Sent: Thursday, October 07, 2010 8:59 AM
> To: users at openswan.org
> Subject: [Openswan Users] no preshared key found error
>
> hi all - getting following error on my site-to-site VPN tunnel:
>
> Oct 7 09:33:05 ubuntuFW pluto[23546]: packet from 173.xx.xx.xx:500:
> ignoring unknown Vendor ID payload [4f456d406b6753464548407f]
> Oct 7 09:33:05 ubuntuFW pluto[23546]: packet from 173.xx.xx.xx:500:
> received Vendor ID payload [Dead Peer Detection]
> Oct 7 09:33:05 ubuntuFW pluto[23546]: packet from 173.xx.xx.xx:500:
> received Vendor ID payload [RFC 3947] method set to=109
> Oct 7 09:33:05 ubuntuFW pluto[23546]: packet from 173.xx.xx.xx:500:
> received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] meth=108,
> but
> already using method 109
> Oct 7 09:33:05 ubuntuFW pluto[23546]: packet from 173.xx.xx.xx:500:
> received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
> meth=106,
> but already using method 109
> Oct 7 09:33:05 ubuntuFW pluto[23546]: packet from 173.xx.xx.xx:500:
> received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107,
> but
> already using method 109
> Oct 7 09:33:05 ubuntuFW pluto[23546]: packet from 173.xx.xx.xx:500:
> received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
> Oct 7 09:33:05 ubuntuFW pluto[23546]: "SF-To-Trenton" #27:
> responding
> to Main Mode
> Oct 7 09:33:05 ubuntuFW pluto[23546]: "SF-To-Trenton" #27: Can't
> authenticate: no preshared key found for `@sf.xx.com' and
> `@trenton.xx.com'. Attribute OAKLEY_AUTHENTICATION_METHOD
> Oct 7 09:33:05 ubuntuFW pluto[23546]: last message repeated 11 times
> Oct 7 09:33:05 ubuntuFW pluto[23546]: "SF-To-Trenton" #27: no
> acceptable Oakley Transform
> Oct 7 09:33:05 ubuntuFW pluto[23546]: "SF-To-Trenton" #27: sending
> notification NO_PROPOSAL_CHOSEN to 173.xx.xx.xx:500
> Oct 7 09:33:31 ubuntuFW pluto[23546]: "SF-To-Trenton" #1: ignoring
> informational payload, type NO_PROPOSAL_CHOSEN msgid=00000000
> Oct 7 09:33:31 ubuntuFW pluto[23546]: "SF-To-Trenton" #1: received
> and
> ignored informational message
>
> not sure what the deal is this is a very basic setup. two ubuntu
> 10.4
> servers w/ public IPs. here's ipsec.conf:
>
>
> @ubuntuFW:/etc$ sudo vi ipsec.conf
> #
> # NAT-TRAVERSAL support, see README.NAT-Traversal
> nat_traversal=yes
> # exclude networks used on server side by adding
> %v4:!a.b.c.0/24
>
> virtual_private=%v4:10.0.0.0/8,%v4:192.168.0.0/16,%v4:172.16.0.0/12
> # OE is now off by default. Uncomment and change to on, to
> enable.
> oe=off
> # which IPsec stack to use. netkey,klips,mast,auto or none
> protostack=netkey
>
>
> # Add connections here
> conn SF-To-Trenton
> authby=secret
> left=69.xx.xx.xx
> leftsubnet=192.168.0.0/24
> leftid=@sf.xx.com
> leftnexthop=%defaultroute
> right=173.xx.xx.xx
> rightsubnet=192.168.10.0/24
> rightid=@trenton.xx.com
> auto=start
>
> # sample VPN connection
> # for more examples, see /etc/ipsec.d/examples/
> #conn sample
> # # Left security gateway, subnet behind it, nexthop
> toward right.
> # left=10.0.0.1
> # leftsubnet=172.16.0.0/24
> # leftnexthop=10.22.33.44
> # # Right security gateway, subnet behind it, nexthop
> toward left.
> # right=10.12.12.1
> # rightsubnet=192.168.0.0/24
> # rightnexthop=10.101.102.103
> # # To authorize this connection, but not actually
> start
> it,
> # # at startup, uncomment this.
> # #auto=start
>
> ..and here's ipsec.secrets file:
>
> # RCSID $Id: ipsec.secrets.proto,v 1.3.6.1 2005/09/28 13:59:14 paul
> Exp
> $
> # This file holds shared secrets or RSA private keys for inter-Pluto
> # authentication. See ipsec_pluto(8) manpage, and HTML
> documentation.
>
> # RSA private key for this host, authenticating it to any other host
> # which knows the public part. Suitable public keys, for ipsec.conf,
> DNS,
> # or configuration of other implementations, can be extracted
> conveniently
> # with "ipsec showhostkey".
> 69.xx.xx.xx 173.xx.xx.xx : "mysecret"
>
> _______________________________________________
> Users at openswan.org
> http://lists.openswan.org/mailman/listinfo/users
> Micropayments:
> https://flattr.com/thing/38387/IPsec-for-Linux-made-easy
> Building and Integrating Virtual Private Networks with Openswan:
> http://www.amazon.com/gp/product/1904811256/104-3099591-2946327?n=283155
More information about the Users
mailing list